The merger of Face.com and Facebook was originally lauded by the software company on its blog but data security questions immediately began to arise due to privacy concerns but the fact that KLIK, Face.com’s mobile app, may have come with a dirty little secret.

By Tony Larks, Vice President, Global Consumer Marketing, Trend Micro There’s a lot of rubbish spoken online. Misinformation pings around the web at a hundred miles a minute, perpetuating myths and half-truths with conviction. Unfortunately not all of it is harmless waffle. When it comes to your computer, there has been a perception that Macs…

The Cyber Intelligence Sharing and Protection Act (CISPA) is supposed to let private Internet protection companies communicate more directly with the federal government to reduce vulnerability and enhance internet security, but the current administration seems to think this is a bad idea.

The FBI is asking online communication companies – including Microsoft, Facebook and Google – for their cooperation in an initiative that would see the extension of government surveillance capabilities across the digital frontier.

The Cyber Intelligence Sharing and Protection Act (CISPA) is supposed to let private Internet protection companies communicate more directly with the federal government to reduce vulnerability and enhance internet security, but the current administration seems to think this is a bad idea.

Video series based on Trend Micro session* at the Mobile World Congress 2012. PREVIOUS: Day 4 – Mobile security matters […] What is the recommendation? What is the right approach eventually to try to leverage the business value that in fact exists in consumerization, without really exposing the company to all the risks in terms…

By Vic Hargrave These days the computer news media uses the terms hacker and cybercriminal more or less interchangeably. That can be misleading. While their meanings overlap, they are not exactly the same thing in all contexts. A cybercriminal is just what the name implies, a person who uses computer technology to commit a crime for…

By Tony Larks, Vice President, Global Consumer Marketing, Trend Micro Do you have an Android™ phone? Have you tried to root it in order to customise it and run unsanctioned apps on it? To root or not to root? The answer to that question is no! We strongly urge you not to root your Android…

As the digital landscape evolves and becomes a more-necessary aspect of business, decision-makers are learning they need to monitor employee behavior to ensure mission-critical applications and data remain safe.